Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\041811-12682-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03417000 PsLoadedModuleList = 0xfffff800`0365ce90
Debug session time: Mon Apr 18 03:47:34.364 2011 (UTC - 4:00)
System Uptime: 0 days 0:27:54.566
Loading Kernel Symbols
...............................................................
................................................................
....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {58, 7, 0, fffff880110084c6}
Unable to load image nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessIsrCompletedPacket+46 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000058, memory referenced
Arg2: 0000000000000007, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880110084c6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036c80e8
0000000000000058
CURRENT_IRQL: 7
FAULTING_IP:
dxgmms1!VidSchiProcessIsrCompletedPacket+46
fffff880`110084c6 837b5803 cmp dword ptr [rbx+58h],3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: ustation.exe
TRAP_FRAME: fffff8800c282cd0 -- (.trap 0xfffff8800c282cd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8009e43910 rbx=0000000000000000 rcx=0000000000000004
rdx=fffffa8009e43911 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880110084c6 rsp=fffff8800c282e60 rbp=fffffa8009e04410
r8=0000000000000001 r9=0000000000000000 r10=fffffa8009e04bd0
r11=fffffa8009e439e0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
dxgmms1!VidSchiProcessIsrCompletedPacket+0x46:
fffff880`110084c6 837b5803 cmp dword ptr [rbx+58h],3 ds:00000000`00000058=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003496be9 to fffff80003497640
STACK_TEXT:
fffff880`0c282b88 fffff800`03496be9 : 00000000`0000000a 00000000`00000058 00000000`00000007 00000000`00000000 : nt!KeBugCheckEx
fffff880`0c282b90 fffff800`03495860 : fffff880`00000039 00000000`09d40204 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0c282cd0 fffff880`110084c6 : fffffa80`09e439c0 fffffa80`09e04410 fffffa80`09e42000 fffffa80`09e42000 : nt!KiPageFault+0x260
fffff880`0c282e60 fffff880`11008172 : fffffa80`09e42000 00000000`00000000 00000000`00000001 fffff880`0c2831a0 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x46
fffff880`0c282ef0 fffff880`11007f76 : fffffa80`000084e3 00000000`00000001 fffffa80`09e38000 fffffa80`09bf0000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ea
fffff880`0c282f40 fffff880`11cf213f : fffffa80`08ab9040 00000000`00000000 00000000`000003d0 00000000`00000000 : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
fffff880`0c282f70 fffff880`1114797e : fffff880`0c2831a0 fffff880`0c2831a0 00000000`00000000 fffffa80`08cf5000 : dxgkrnl!DxgNotifyInterruptCB+0x83
fffff880`0c282fa0 fffff880`0c2831a0 : fffff880`0c2831a0 00000000`00000000 fffffa80`08cf5000 fffff880`1114790e : nvlddmkm+0xb597e
fffff880`0c282fa8 fffff880`0c2831a0 : 00000000`00000000 fffffa80`08cf5000 fffff880`1114790e fffffa80`08cf5000 : 0xfffff880`0c2831a0
fffff880`0c282fb0 00000000`00000000 : fffffa80`08cf5000 fffff880`1114790e fffffa80`08cf5000 00000000`00000000 : 0xfffff880`0c2831a0
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidSchiProcessIsrCompletedPacket+46
fffff880`110084c6 837b5803 cmp dword ptr [rbx+58h],3
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VidSchiProcessIsrCompletedPacket+46
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799c1
FAILURE_BUCKET_ID: X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
BUCKET_ID: X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040611-13104-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03404000 PsLoadedModuleList = 0xfffff800`03649e90
Debug session time: Wed Apr 6 02:09:42.407 2011 (UTC - 4:00)
System Uptime: 0 days 0:09:54.983
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {58, 5, 0, fffff880110084c6}
Unable to load image nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessIsrCompletedPacket+46 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000058, memory referenced
Arg2: 0000000000000005, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff880110084c6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036b50e8
0000000000000058
CURRENT_IRQL: 5
FAULTING_IP:
dxgmms1!VidSchiProcessIsrCompletedPacket+46
fffff880`110084c6 837b5803 cmp dword ptr [rbx+58h],3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: ustation.exe
TRAP_FRAME: fffff8800c246b70 -- (.trap 0xfffff8800c246b70)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8009dcece0 rbx=0000000000000000 rcx=0000000000000009
rdx=fffffa8009dcece1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff880110084c6 rsp=fffff8800c246d00 rbp=fffffa8009d66410
r8=0000000000000001 r9=0000000000000000 r10=fffffa8009d66bd0
r11=fffffa8009dcedb0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
dxgmms1!VidSchiProcessIsrCompletedPacket+0x46:
fffff880`110084c6 837b5803 cmp dword ptr [rbx+58h],3 ds:00000000`00000058=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003483be9 to fffff80003484640
STACK_TEXT:
fffff880`0c246a28 fffff800`03483be9 : 00000000`0000000a 00000000`00000058 00000000`00000005 00000000`00000000 : nt!KeBugCheckEx
fffff880`0c246a30 fffff800`03482860 : 00000000`07f80000 fffffa80`00000039 fffff8a0`038c0000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0c246b70 fffff880`110084c6 : fffffa80`09dced90 fffffa80`09d66410 fffffa80`09dce000 fffffa80`09dce000 : nt!KiPageFault+0x260
fffff880`0c246d00 fffff880`11008172 : fffffa80`09dce000 00000000`00000000 fffffa80`00000001 fffff880`0c247040 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x46
fffff880`0c246d90 fffff880`11007f76 : fffff880`00060238 fffffa80`08b17000 fffffa80`09dc4000 fffffa80`09a24000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ea
fffff880`0c246de0 fffff880`11ce013f : fffffa80`08a89480 00000000`00000000 00000000`000003d0 00000000`00000000 : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
fffff880`0c246e10 fffff880`1113597e : fffff880`0c247040 fffff880`0c247040 00000000`00000000 fffffa80`08b17000 : dxgkrnl!DxgNotifyInterruptCB+0x83
fffff880`0c246e40 fffff880`0c247040 : fffff880`0c247040 00000000`00000000 fffffa80`08b17000 fffff880`1113590e : nvlddmkm+0xb597e
fffff880`0c246e48 fffff880`0c247040 : 00000000`00000000 fffffa80`08b17000 fffff880`1113590e fffffa80`08b17000 : 0xfffff880`0c247040
fffff880`0c246e50 00000000`00000000 : fffffa80`08b17000 fffff880`1113590e fffffa80`08b17000 00000000`00000000 : 0xfffff880`0c247040
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidSchiProcessIsrCompletedPacket+46
fffff880`110084c6 837b5803 cmp dword ptr [rbx+58h],3
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VidSchiProcessIsrCompletedPacket+46
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799c1
FAILURE_BUCKET_ID: X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
BUCKET_ID: X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040611-12464-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03413000 PsLoadedModuleList = 0xfffff800`03658e90
Debug session time: Wed Apr 6 01:59:06.980 2011 (UTC - 4:00)
System Uptime: 0 days 0:32:17.556
Loading Kernel Symbols
...............................................................
................................................................
...................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {58, 7, 0, fffff88011d984c6}
Unable to load image nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessIsrCompletedPacket+46 )
Followup: MachineOwner
---------
3: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000058, memory referenced
Arg2: 0000000000000007, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88011d984c6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036c40e8
0000000000000058
CURRENT_IRQL: 7
FAULTING_IP:
dxgmms1!VidSchiProcessIsrCompletedPacket+46
fffff880`11d984c6 837b5803 cmp dword ptr [rbx+58h],3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: ustation.exe
TRAP_FRAME: fffff8800d4e3cd0 -- (.trap 0xfffff8800d4e3cd0)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8009d916a0 rbx=0000000000000000 rcx=0000000000000008
rdx=fffffa8009d916a1 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88011d984c6 rsp=fffff8800d4e3e60 rbp=fffffa8009c09410
r8=0000000000000001 r9=0000000000000000 r10=fffffa8009c09bd0
r11=fffffa8009d916a0 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
dxgmms1!VidSchiProcessIsrCompletedPacket+0x46:
fffff880`11d984c6 837b5803 cmp dword ptr [rbx+58h],3 ds:00000000`00000058=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003492be9 to fffff80003493640
STACK_TEXT:
fffff880`0d4e3b88 fffff800`03492be9 : 00000000`0000000a 00000000`00000058 00000000`00000007 00000000`00000000 : nt!KeBugCheckEx
fffff880`0d4e3b90 fffff800`03491860 : fffff880`00000039 00000000`07fb0204 00000000`00000000 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0d4e3cd0 fffff880`11d984c6 : fffffa80`09d91680 fffffa80`09c09410 fffffa80`09d90000 fffffa80`09d90000 : nt!KiPageFault+0x260
fffff880`0d4e3e60 fffff880`11d98172 : fffffa80`09d90000 00000000`00000000 00000000`00000001 fffff880`0d4e41a0 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x46
fffff880`0d4e3ef0 fffff880`11d97f76 : fffffa80`000a60c7 00000000`00000001 fffffa80`09d86000 fffffa80`0999a000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ea
fffff880`0d4e3f40 fffff880`11c9f13f : fffffa80`08c15480 00000000`00000000 00000000`000003d0 00000000`00000000 : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
fffff880`0d4e3f70 fffff880`110f497e : fffff880`0d4e41a0 fffff880`0d4e41a0 00000000`00000000 fffffa80`08cba000 : dxgkrnl!DxgNotifyInterruptCB+0x83
fffff880`0d4e3fa0 fffff880`0d4e41a0 : fffff880`0d4e41a0 00000000`00000000 fffffa80`08cba000 fffff880`110f490e : nvlddmkm+0xb597e
fffff880`0d4e3fa8 fffff880`0d4e41a0 : 00000000`00000000 fffffa80`08cba000 fffff880`110f490e fffffa80`08cba000 : 0xfffff880`0d4e41a0
fffff880`0d4e3fb0 00000000`00000000 : fffffa80`08cba000 fffff880`110f490e fffffa80`08cba000 00000000`00000000 : 0xfffff880`0d4e41a0
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidSchiProcessIsrCompletedPacket+46
fffff880`11d984c6 837b5803 cmp dword ptr [rbx+58h],3
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VidSchiProcessIsrCompletedPacket+46
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799c1
FAILURE_BUCKET_ID: X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
BUCKET_ID: X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\040611-12729-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03419000 PsLoadedModuleList = 0xfffff800`0365ee90
Debug session time: Wed Apr 6 03:41:37.283 2011 (UTC - 4:00)
System Uptime: 0 days 0:47:23.860
Loading Kernel Symbols
...............................................................
................................................................
.....................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {58, 5, 0, fffff88011d7c4c6}
Unable to load image nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiProcessIsrCompletedPacket+46 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000058, memory referenced
Arg2: 0000000000000005, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88011d7c4c6, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036ca0e8
0000000000000058
CURRENT_IRQL: 5
FAULTING_IP:
dxgmms1!VidSchiProcessIsrCompletedPacket+46
fffff880`11d7c4c6 837b5803 cmp dword ptr [rbx+58h],3
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: ustation.exe
TRAP_FRAME: fffff8800acfd210 -- (.trap 0xfffff8800acfd210)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=fffffa8009d26430 rbx=0000000000000000 rcx=0000000000000009
rdx=fffffa8009d26431 rsi=0000000000000000 rdi=0000000000000000
rip=fffff88011d7c4c6 rsp=fffff8800acfd3a0 rbp=fffffa8009c4b410
r8=0000000000000001 r9=0000000000000000 r10=fffffa8009c4bbd0
r11=fffffa8009d26500 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl nz na pe nc
dxgmms1!VidSchiProcessIsrCompletedPacket+0x46:
fffff880`11d7c4c6 837b5803 cmp dword ptr [rbx+58h],3 ds:00000000`00000058=????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003498be9 to fffff80003499640
STACK_TEXT:
fffff880`0acfd0c8 fffff800`03498be9 : 00000000`0000000a 00000000`00000058 00000000`00000005 00000000`00000000 : nt!KeBugCheckEx
fffff880`0acfd0d0 fffff800`03497860 : 00000000`00000000 00000000`00000000 00000000`00000003 00000000`00000000 : nt!KiBugCheckDispatch+0x69
fffff880`0acfd210 fffff880`11d7c4c6 : fffffa80`09d264e0 fffffa80`09c4b410 fffffa80`09d25000 fffffa80`09d25000 : nt!KiPageFault+0x260
fffff880`0acfd3a0 fffff880`11d7c172 : fffffa80`09d25000 00000000`00000000 fffffa80`00000001 fffff880`0acfd6e0 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x46
fffff880`0acfd430 fffff880`11d7bf76 : fffff880`0012f017 fffffa80`08c86000 fffffa80`09d1b000 fffffa80`09a12000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ea
fffff880`0acfd480 fffff880`11c8313f : fffffa80`08ae33f0 00000000`00000000 00000000`000003d0 00000000`00000000 : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
fffff880`0acfd4b0 fffff880`110d897e : fffff880`0acfd6e0 fffff880`0acfd6e0 00000000`00000000 fffffa80`08c86000 : dxgkrnl!DxgNotifyInterruptCB+0x83
fffff880`0acfd4e0 fffff880`0acfd6e0 : fffff880`0acfd6e0 00000000`00000000 fffffa80`08c86000 fffff880`110d890e : nvlddmkm+0xb597e
fffff880`0acfd4e8 fffff880`0acfd6e0 : 00000000`00000000 fffffa80`08c86000 fffff880`110d890e fffffa80`08c86000 : 0xfffff880`0acfd6e0
fffff880`0acfd4f0 00000000`00000000 : fffffa80`08c86000 fffff880`110d890e fffffa80`08c86000 00000000`00000000 : 0xfffff880`0acfd6e0
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidSchiProcessIsrCompletedPacket+46
fffff880`11d7c4c6 837b5803 cmp dword ptr [rbx+58h],3
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VidSchiProcessIsrCompletedPacket+46
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799c1
FAILURE_BUCKET_ID: X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
BUCKET_ID: X64_0xD1_dxgmms1!VidSchiProcessIsrCompletedPacket+46
dxgmms1!VidSchiUpdateContextRunningTimeAtISR:
fffff880`11da6050 4c8bdc mov r11,rsp
fffff880`11da6053 49895b10 mov qword ptr [r11+10h],rbx
fffff880`11da6057 49896b18 mov qword ptr [r11+18h],rbp
fffff880`11da605b 49897320 mov qword ptr [r11+20h],rsi
fffff880`11da605f 57 push rdi
fffff880`11da6060 4154 push r12
fffff880`11da6062 4155 push r13
fffff880`11da6064 4883ec20 sub rsp,20h
fffff880`11da6068 488b39 mov rdi,qword ptr [rcx]
fffff880`11da606b 4533ed xor r13d,r13d
fffff880`11da606e 488be9 mov rbp,rcx
fffff880`11da6071 488b5f50 mov rbx,qword ptr [rdi+50h]
fffff880`11da6075 33c0 xor eax,eax
fffff880`11da6077 4c8b6310 mov r12,qword ptr [rbx+10h]
fffff880`11da607b f0440fb1af90010000 lock cmpxchg dword ptr [rdi+190h],r13d
fffff880`11da6084 83f801 cmp eax,1
fffff880`11da6087 498d4b08 lea rcx,[r11+8]
fffff880`11da608b 400f94c6 sete sil
fffff880`11da608f ff156b4f0000 call qword ptr [dxgmms1!_imp_KeQueryPerformanceCounter (fffff880`11dab000)]
fffff880`11da6095 33d2 xor edx,edx
fffff880`11da6097 4c8bd8 mov r11,rax
fffff880`11da609a 482b87a8010000 sub rax,qword ptr [rdi+1A8h]
fffff880`11da60a1 4869c080969800 imul rax,rax,989680h
fffff880`11da60a8 48f7742440 div rax,qword ptr [rsp+40h]
fffff880`11da60ad 480187a0010000 add qword ptr [rdi+1A0h],rax
fffff880`11da60b4 48018358090000 add qword ptr [rbx+958h],rax
fffff880`11da60bb 488b5750 mov rdx,qword ptr [rdi+50h]
fffff880`11da60bf 488b4a10 mov rcx,qword ptr [rdx+10h]
fffff880`11da60c3 8b5204 mov edx,dword ptr [rdx+4]
fffff880`11da60c6 448b4104 mov r8d,dword ptr [rcx+4]
fffff880`11da60ca 488b4f58 mov rcx,qword ptr [rdi+58h]
fffff880`11da60ce 488b4928 mov rcx,qword ptr [rcx+28h]
fffff880`11da60d2 4a8b4cc118 mov rcx,qword ptr [rcx+r8*8+18h]
fffff880`11da60d7 488b54d108 mov rdx,qword ptr [rcx+rdx*8+8]
fffff880`11da60dc 480102 add qword ptr [rdx],rax
fffff880`11da60df 4c899fa8010000 mov qword ptr [rdi+1A8h],r11
fffff880`11da60e6 413af5 cmp sil,r13b
fffff880`11da60e9 750b jne dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xa6 (fffff880`11da60f6)
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x9b:
fffff880`11da60eb 41f684247808000008 test byte ptr [r12+878h],8
fffff880`11da60f4 7428 je dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce (fffff880`11da611e)
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xa6:
fffff880`11da60f6 48298798010000 sub qword ptr [rdi+198h],rax
fffff880`11da60fd 413af5 cmp sil,r13b
fffff880`11da6100 741c je dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce (fffff880`11da611e)
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xb2:
fffff880`11da6102 4c39af98010000 cmp qword ptr [rdi+198h],r13
fffff880`11da6109 7f13 jg dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce (fffff880`11da611e)
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xbb:
fffff880`11da610b b902000000 mov ecx,2
fffff880`11da6110 8d41ff lea eax,[rcx-1]
fffff880`11da6113 f00fb18f90010000 lock cmpxchg dword ptr [rdi+190h],ecx
fffff880`11da611b 418af5 mov sil,r13b
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce:
fffff880`11da611e 488b05934f0000 mov rax,qword ptr [dxgmms1!_imp_g_loggerInfo (fffff880`11dab0b8)]
fffff880`11da6125 44396808 cmp dword ptr [rax+8],r13d
fffff880`11da6129 7425 je dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x100 (fffff880`11da6150)
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xdb:
fffff880`11da612b 488b4f28 mov rcx,qword ptr [rdi+28h]
fffff880`11da612f 448b8f90010000 mov r9d,dword ptr [rdi+190h]
fffff880`11da6136 4c8b8798010000 mov r8,qword ptr [rdi+198h]
fffff880`11da613d 488b97a0010000 mov rdx,qword ptr [rdi+1A0h]
fffff880`11da6144 493bcd cmp rcx,r13
fffff880`11da6147 480f44cf cmove rcx,rdi
fffff880`11da614b e88477ffff call dxgmms1!TraceDxgkUpdateContextRunningTime (fffff880`11d9d8d4)
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x100:
fffff880`11da6150 488b8f98010000 mov rcx,qword ptr [rdi+198h]
fffff880`11da6157 488b5c2448 mov rbx,qword ptr [rsp+48h]
fffff880`11da615c 408ac6 mov al,sil
fffff880`11da615f 488b742458 mov rsi,qword ptr [rsp+58h]
fffff880`11da6164 48894d10 mov qword ptr [rbp+10h],rcx
fffff880`11da6168 488b8fa0010000 mov rcx,qword ptr [rdi+1A0h]
fffff880`11da616f 48894d08 mov qword ptr [rbp+8],rcx
fffff880`11da6173 488b6c2450 mov rbp,qword ptr [rsp+50h]
fffff880`11da6178 4883c420 add rsp,20h
fffff880`11da617c 415d pop r13
fffff880`11da617e 415c pop r12
fffff880`11da6180 5f pop rdi
fffff880`11da6181 c3 ret
Followup: MachineOwner
---------
Microsoft (R) Windows Debugger Version 6.12.0002.633 AMD64
Copyright (c) Microsoft Corporation. All rights reserved.
Loading Dump File [F:\DMP\042011-14398-01.dmp]
Mini Kernel Dump File: Only registers and stack trace are available
Symbol search path is: SRV*c:\websymbols*http://msdl.microsoft.com/download/symbols
Executable search path is:
Windows 7 Kernel Version 7601 (Service Pack 1) MP (4 procs) Free x64
Product: WinNt, suite: TerminalServer SingleUserTS
Built by: 7601.17514.amd64fre.win7sp1_rtm.101119-1850
Machine Name:
Kernel base = 0xfffff800`03409000 PsLoadedModuleList = 0xfffff800`0364ee90
Debug session time: Wed Apr 20 04:03:24.922 2011 (UTC - 4:00)
System Uptime: 0 days 2:35:32.124
Loading Kernel Symbols
...............................................................
................................................................
.......................
Loading User Symbols
Loading unloaded module list
......
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
Use !analyze -v to get detailed debugging information.
BugCheck D1, {50, 5, 0, fffff88011da6071}
Unable to load image nvlddmkm.sys, Win32 error 0n2
*** WARNING: Unable to verify timestamp for nvlddmkm.sys
*** ERROR: Module load completed but symbols could not be loaded for nvlddmkm.sys
Probably caused by : dxgmms1.sys ( dxgmms1!VidSchiUpdateContextRunningTimeAtISR+21 )
Followup: MachineOwner
---------
2: kd> !analyze -v
*******************************************************************************
* *
* Bugcheck Analysis *
* *
*******************************************************************************
DRIVER_IRQL_NOT_LESS_OR_EQUAL (d1)
An attempt was made to access a pageable (or completely invalid) address at an
interrupt request level (IRQL) that is too high. This is usually
caused by drivers using improper addresses.
If kernel debugger is available get stack backtrace.
Arguments:
Arg1: 0000000000000050, memory referenced
Arg2: 0000000000000005, IRQL
Arg3: 0000000000000000, value 0 = read operation, 1 = write operation
Arg4: fffff88011da6071, address which referenced memory
Debugging Details:
------------------
READ_ADDRESS: GetPointerFromAddress: unable to read from fffff800036ba0e8
0000000000000050
CURRENT_IRQL: 5
FAULTING_IP:
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+21
fffff880`11da6071 488b5f50 mov rbx,qword ptr [rdi+50h]
CUSTOMER_CRASH_COUNT: 1
DEFAULT_BUCKET_ID: VISTA_DRIVER_FAULT
BUGCHECK_STR: 0xD1
PROCESS_NAME: ustation.exe
TRAP_FRAME: fffff88003db2650 -- (.trap 0xfffff88003db2650)
NOTE: The trap frame does not contain all registers.
Some register values may be zeroed or incorrect.
rax=0000000000000000 rbx=0000000000000000 rcx=fffff88003db2860
rdx=00000000003bd35e rsi=0000000000000000 rdi=0000000000000000
rip=fffff88011da6071 rsp=fffff88003db27e0 rbp=fffff88003db2860
r8=0000000000000001 r9=0000000000000000 r10=fffffa8000000000
r11=fffff88003db2818 r12=0000000000000000 r13=0000000000000000
r14=0000000000000000 r15=0000000000000000
iopl=0 nv up ei pl zr na po nc
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x21:
fffff880`11da6071 488b5f50 mov rbx,qword ptr [rdi+50h] ds:00000000`00000050=????????????????
Resetting default scope
LAST_CONTROL_TRANSFER: from fffff80003488be9 to fffff80003489640
STACK_TEXT:
fffff880`03db2508 fffff800`03488be9 : 00000000`0000000a 00000000`00000050 00000000`00000005 00000000`00000000 : nt!KeBugCheckEx
fffff880`03db2510 fffff800`03487860 : fffffa80`0a46b010 00000000`00000000 00000000`00000000 fffffa80`09d675b0 : nt!KiBugCheckDispatch+0x69
fffff880`03db2650 fffff880`11da6071 : 00000000`00000000 fffffa80`09d66000 00000000`00000000 00000000`0000000c : nt!KiPageFault+0x260
fffff880`03db27e0 fffff880`11da25af : fffffa80`09d67410 fffffa80`09d675b0 fffffa80`09d20410 fffffa80`09d66000 : dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x21
fffff880`03db2820 fffff880`11da2172 : fffffa80`09d66000 00000000`00000000 fffffa80`00000001 fffff880`03db2b60 : dxgmms1!VidSchiProcessIsrCompletedPacket+0x12f
fffff880`03db28b0 fffff880`11da1f76 : fffff880`003bd35e fffffa80`08d65000 fffffa80`09d5c000 fffffa80`09afb000 : dxgmms1!VidSchDdiNotifyInterruptWorker+0x1ea
fffff880`03db2900 fffff880`11ca913f : fffffa80`08aa32f0 00000000`00000000 00000000`000003d0 00000000`00000000 : dxgmms1!VidSchDdiNotifyInterrupt+0x9e
fffff880`03db2930 fffff880`110fe97e : fffff880`03db2b60 fffff880`03db2b60 00000000`00000000 fffffa80`08d65000 : dxgkrnl!DxgNotifyInterruptCB+0x83
fffff880`03db2960 fffff880`03db2b60 : fffff880`03db2b60 00000000`00000000 fffffa80`08d65000 fffff880`110fe90e : nvlddmkm+0xb597e
fffff880`03db2968 fffff880`03db2b60 : 00000000`00000000 fffffa80`08d65000 fffff880`110fe90e fffffa80`08d65000 : 0xfffff880`03db2b60
fffff880`03db2970 00000000`00000000 : fffffa80`08d65000 fffff880`110fe90e fffffa80`08d65000 00000000`00000000 : 0xfffff880`03db2b60
STACK_COMMAND: kb
FOLLOWUP_IP:
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+21
fffff880`11da6071 488b5f50 mov rbx,qword ptr [rdi+50h]
SYMBOL_STACK_INDEX: 3
SYMBOL_NAME: dxgmms1!VidSchiUpdateContextRunningTimeAtISR+21
FOLLOWUP_NAME: MachineOwner
MODULE_NAME: dxgmms1
IMAGE_NAME: dxgmms1.sys
DEBUG_FLR_IMAGE_TIMESTAMP: 4ce799c1
FAILURE_BUCKET_ID: X64_0xD1_dxgmms1!VidSchiUpdateContextRunningTimeAtISR+21
BUCKET_ID: X64_0xD1_dxgmms1!VidSchiUpdateContextRunningTimeAtISR+21
Followup: MachineOwner
---------
dxgmms1!VidSchiUpdateContextRunningTimeAtISR:
fffff880`11da6050 4c8bdc mov r11,rsp
fffff880`11da6053 49895b10 mov qword ptr [r11+10h],rbx
fffff880`11da6057 49896b18 mov qword ptr [r11+18h],rbp
fffff880`11da605b 49897320 mov qword ptr [r11+20h],rsi
fffff880`11da605f 57 push rdi
fffff880`11da6060 4154 push r12
fffff880`11da6062 4155 push r13
fffff880`11da6064 4883ec20 sub rsp,20h
fffff880`11da6068 488b39 mov rdi,qword ptr [rcx]
fffff880`11da606b 4533ed xor r13d,r13d
fffff880`11da606e 488be9 mov rbp,rcx
fffff880`11da6071 488b5f50 mov rbx,qword ptr [rdi+50h]
fffff880`11da6075 33c0 xor eax,eax
fffff880`11da6077 4c8b6310 mov r12,qword ptr [rbx+10h]
fffff880`11da607b f0440fb1af90010000 lock cmpxchg dword ptr [rdi+190h],r13d
fffff880`11da6084 83f801 cmp eax,1
fffff880`11da6087 498d4b08 lea rcx,[r11+8]
fffff880`11da608b 400f94c6 sete sil
fffff880`11da608f ff156b4f0000 call qword ptr [dxgmms1!_imp_KeQueryPerformanceCounter (fffff880`11dab000)]
fffff880`11da6095 33d2 xor edx,edx
fffff880`11da6097 4c8bd8 mov r11,rax
fffff880`11da609a 482b87a8010000 sub rax,qword ptr [rdi+1A8h]
fffff880`11da60a1 4869c080969800 imul rax,rax,989680h
fffff880`11da60a8 48f7742440 div rax,qword ptr [rsp+40h]
fffff880`11da60ad 480187a0010000 add qword ptr [rdi+1A0h],rax
fffff880`11da60b4 48018358090000 add qword ptr [rbx+958h],rax
fffff880`11da60bb 488b5750 mov rdx,qword ptr [rdi+50h]
fffff880`11da60bf 488b4a10 mov rcx,qword ptr [rdx+10h]
fffff880`11da60c3 8b5204 mov edx,dword ptr [rdx+4]
fffff880`11da60c6 448b4104 mov r8d,dword ptr [rcx+4]
fffff880`11da60ca 488b4f58 mov rcx,qword ptr [rdi+58h]
fffff880`11da60ce 488b4928 mov rcx,qword ptr [rcx+28h]
fffff880`11da60d2 4a8b4cc118 mov rcx,qword ptr [rcx+r8*8+18h]
fffff880`11da60d7 488b54d108 mov rdx,qword ptr [rcx+rdx*8+8]
fffff880`11da60dc 480102 add qword ptr [rdx],rax
fffff880`11da60df 4c899fa8010000 mov qword ptr [rdi+1A8h],r11
fffff880`11da60e6 413af5 cmp sil,r13b
fffff880`11da60e9 750b jne dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xa6 (fffff880`11da60f6)
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x9b:
fffff880`11da60eb 41f684247808000008 test byte ptr [r12+878h],8
fffff880`11da60f4 7428 je dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce (fffff880`11da611e)
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xa6:
fffff880`11da60f6 48298798010000 sub qword ptr [rdi+198h],rax
fffff880`11da60fd 413af5 cmp sil,r13b
fffff880`11da6100 741c je dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce (fffff880`11da611e)
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xb2:
fffff880`11da6102 4c39af98010000 cmp qword ptr [rdi+198h],r13
fffff880`11da6109 7f13 jg dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce (fffff880`11da611e)
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xbb:
fffff880`11da610b b902000000 mov ecx,2
fffff880`11da6110 8d41ff lea eax,[rcx-1]
fffff880`11da6113 f00fb18f90010000 lock cmpxchg dword ptr [rdi+190h],ecx
fffff880`11da611b 418af5 mov sil,r13b
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xce:
fffff880`11da611e 488b05934f0000 mov rax,qword ptr [dxgmms1!_imp_g_loggerInfo (fffff880`11dab0b8)]
fffff880`11da6125 44396808 cmp dword ptr [rax+8],r13d
fffff880`11da6129 7425 je dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x100 (fffff880`11da6150)
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0xdb:
fffff880`11da612b 488b4f28 mov rcx,qword ptr [rdi+28h]
fffff880`11da612f 448b8f90010000 mov r9d,dword ptr [rdi+190h]
fffff880`11da6136 4c8b8798010000 mov r8,qword ptr [rdi+198h]
fffff880`11da613d 488b97a0010000 mov rdx,qword ptr [rdi+1A0h]
fffff880`11da6144 493bcd cmp rcx,r13
fffff880`11da6147 480f44cf cmove rcx,rdi
fffff880`11da614b e88477ffff call dxgmms1!TraceDxgkUpdateContextRunningTime (fffff880`11d9d8d4)
dxgmms1!VidSchiUpdateContextRunningTimeAtISR+0x100:
fffff880`11da6150 488b8f98010000 mov rcx,qword ptr [rdi+198h]
fffff880`11da6157 488b5c2448 mov rbx,qword ptr [rsp+48h]
fffff880`11da615c 408ac6 mov al,sil
fffff880`11da615f 488b742458 mov rsi,qword ptr [rsp+58h]
fffff880`11da6164 48894d10 mov qword ptr [rbp+10h],rcx
fffff880`11da6168 488b8fa0010000 mov rcx,qword ptr [rdi+1A0h]
fffff880`11da616f 48894d08 mov qword ptr [rbp+8],rcx
fffff880`11da6173 488b6c2450 mov rbp,qword ptr [rsp+50h]
fffff880`11da6178 4883c420 add rsp,20h
fffff880`11da617c 415d pop r13
fffff880`11da617e 415c pop r12
fffff880`11da6180 5f pop rdi
fffff880`11da6181 c3 ret